A. Physical devices only
B. Software interfaces
C. Network cables
D. Data storage units
A. Hardening routers to prevent unauthorized access
B. Encrypting data in transit with MACSEC
C. Implementing ACLs for traffic filtering
D. Enhancing user interface designs
A. Ensure a single path for data flow to increase security
B. Provide multiple paths for data to increase redundancy and load balancing
C. Increase the cost of network infrastructure
D. Decrease bandwidth between NFVI and physical infrastructure
A. Sending unsolicited alerts from network devices to a management station
B. Monitoring network performance in real-time
C. Virtualizing network functions
D. Encrypting data packets
A. Increase the physical storage capacity for cloud providers
B. Provide backup power solutions for data centers
C. Reduce latency by bringing cloud resources closer to the end-user
D. Centralize cloud operations in a single location
A. Reduce the bandwidth available between sites
B. Provide layer 2 connectivity over a layer 3 network
C. Simplify network topology by eliminating virtual connections
D. Encrypt data at the transport layer
A. Network File Versioning
B. Network Function Visualization
C. New Function Virtualization
D. Network Function Virtualization
A. Manual scaling of applications
B. Increased application latency
C. Reduced security
D. Automated management of containers
A. Reduce overall cloud costs
B. Provide isolated network environments within a public cloud
C. Simplify network management
D. Decrease network security
A. Increased network latency
B. Real-time data collection
C. Improved scalability and flexibility
D. Reduced monitoring capabilities